Mandatory access control

Results: 211



#Item
181XTS-400 / Evaluation Assurance Level / Trusted Computer System Evaluation Criteria / Common Criteria / Mandatory access control / BAE Systems / Security Target / Operating system / Access control / Computer security / Evaluation / Security

Security Target, Version 1.22 for

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
182Linux kernel / Linux Security Modules / Unix / Linux / Security-Enhanced Linux / Mandatory access control / Chris Wright / Type enforcement / Kernel / System software / Software / Computer architecture

Linux Security Module Framework Chris Wright and Crispin Cowan WireX Communications, Inc.

Add to Reading List

Source URL: www.kroah.com

Language: English - Date: 2002-09-05 02:32:05
183Access control / HP-UX / System V / Role-based access control / Discretionary access control / Mandatory access control / Common Criteria / PERMIS / Operating system / Computer security / Security / Evaluation

CCOPP-OS HP-UX 11i v3 Common Criteria Security Target

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2010-09-02 21:29:55
184Computer security / Android / Embedded Linux / Smartphones / Mandatory access control / Grsecurity / Sandbox / Principle of least privilege / Linux kernel / System software / Software / Computing

The Case for SE Android Stephen Smalley

Add to Reading List

Source URL: selinuxproject.org

Language: English - Date: 2011-09-13 09:25:39
185Software / National Security Agency / Security-Enhanced Linux / Password / Operating system / Su / Principle of least privilege / Mandatory access control / Access control / System software / Computer security / System administration

Copyright © 2006 ISACA. All rights reserved. www.isaca.org. Delegating Root Authority and Auditing

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2010-03-25 01:50:27
186National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Multilevel security / Mandatory access control / Principle of least privilege / Covert channel / Secure Computing / Computer security / Software quality / Evaluation

Cost Profile of a Highly Assured, Secure Operating System Richard E. Smith Secure Computing Corporation

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
187Gentoo Linux / Hardened Gentoo / Security-Enhanced Linux / Grsecurity / Mandatory access control / RSBAC / Access control list / Linux Security Modules / Type enforcement / Computer security / System software / Access control

SELinux and grsecurity: A Case Study Comparing Linux Security Kernel Enhancements Michael Fox, John Giordano, Lori Stotler, Arun Thomas

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:26
188XTS-400 / Mandatory access control / Common Criteria / Mandatory Integrity Control / Access control / Evaluation Assurance Level / Discretionary access control / Bell–LaPadula model / Biba Model / Computer security / Security / Evaluation

National Information Assurance Partnership ®

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-04-10 16:37:02
189Crime prevention / National security / National Security Agency / Security Target / Multilevel security / Mandatory access control / Security-Enhanced Linux / Common Criteria / Evaluation Assurance Level / Computer security / Security / Evaluation

[ST[removed]updatedBrS] Nexor Sentinel 3E Filtering System - Security Target - NEX2764ENG

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-02-04 05:54:42
190Information theory / Privilege revocation / Evaluation / Mandatory Integrity Control / Ring / Operating system / Data integrity / Unix / Role-based access control / Computer security / Security / LOMAC

PDF Document

Add to Reading List

Source URL: alum.wpi.edu

Language: English - Date: 2004-08-23 17:54:47
UPDATE